首页 > 最新文献

2014 International Conference on Communication and Signal Processing最新文献

英文 中文
Denoising of SAR images using Maximum Likelihood Estimation 基于极大似然估计的SAR图像去噪
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949964
J. J. Nair, Bindhya Bhadran
Image denoising is an important problem in image processing because noise may interfere with visual interpretation. This may create problems in certain applications like classification problem, pattern matching, etc. This paper presents a new approach for image denoising in the case of speckle noise models. The proposed method is a modification of Non Local Means filter method using Maximum Likelihood Estimation. The Non Local Means algorithm performs a weighted average of the similar pixels. Here we introduce a method that performs weighted average on restricted local neighborhoods. More over the method performs weight calculation using Geman-McClure estimation function rather than the exponential function because of the fact that Geman-McClure estimator is better in preserving edge details than the exponential function. Experiments at various noise levels based on PSNR values and SSIM values show that the proposed method outperforms the existing methods and thereby increasing the accuracy of further processing for synthetic aperture radar (SAR) images.
图像去噪是图像处理中的一个重要问题,因为噪声会干扰视觉判读。这可能会在某些应用程序中产生问题,如分类问题、模式匹配等。本文提出了一种适用于散斑噪声模型的图像去噪方法。该方法是一种基于极大似然估计的非局部均值滤波方法的改进。非局部均值算法对相似像素进行加权平均。本文介绍了一种对受限局部邻域进行加权平均的方法。此外,该方法使用Geman-McClure估计函数而不是指数函数进行权值计算,因为Geman-McClure估计函数比指数函数更能保留边缘细节。基于PSNR值和SSIM值的不同噪声水平下的实验表明,该方法优于现有方法,从而提高了合成孔径雷达(SAR)图像进一步处理的精度。
{"title":"Denoising of SAR images using Maximum Likelihood Estimation","authors":"J. J. Nair, Bindhya Bhadran","doi":"10.1109/ICCSP.2014.6949964","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949964","url":null,"abstract":"Image denoising is an important problem in image processing because noise may interfere with visual interpretation. This may create problems in certain applications like classification problem, pattern matching, etc. This paper presents a new approach for image denoising in the case of speckle noise models. The proposed method is a modification of Non Local Means filter method using Maximum Likelihood Estimation. The Non Local Means algorithm performs a weighted average of the similar pixels. Here we introduce a method that performs weighted average on restricted local neighborhoods. More over the method performs weight calculation using Geman-McClure estimation function rather than the exponential function because of the fact that Geman-McClure estimator is better in preserving edge details than the exponential function. Experiments at various noise levels based on PSNR values and SSIM values show that the proposed method outperforms the existing methods and thereby increasing the accuracy of further processing for synthetic aperture radar (SAR) images.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Light-particle interaction in underwater: A modified PSF 水下光粒子相互作用:改进的PSF
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950110
Shatadal Ghosh, R. Ray, S. R. K. Vadali, S. N. Shome
Scattering is an important aspect to be addressed in the field of underwater image processing. The phenomenon of scattering can be better understood by considering interaction of light ray and particle in the medium .Scattering is commonly approximated as a deterministic phenomenon. In the present work, we propose a probabilistic model based on light-particle interaction and provide a modified Point Spread Function (PSF). The PSF so obtained may be used to better explain a physical phenomenon (beam-particle interaction) in the underwater point source image.
散射是水下图像处理领域的一个重要研究方向。考虑介质中光线与粒子的相互作用可以更好地理解散射现象。散射通常近似为一种确定性现象。在本工作中,我们提出了一个基于光粒子相互作用的概率模型,并提供了一个改进的点扩散函数(PSF)。由此获得的PSF可用于更好地解释水下点源图像中的物理现象(光束-粒子相互作用)。
{"title":"Light-particle interaction in underwater: A modified PSF","authors":"Shatadal Ghosh, R. Ray, S. R. K. Vadali, S. N. Shome","doi":"10.1109/ICCSP.2014.6950110","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950110","url":null,"abstract":"Scattering is an important aspect to be addressed in the field of underwater image processing. The phenomenon of scattering can be better understood by considering interaction of light ray and particle in the medium .Scattering is commonly approximated as a deterministic phenomenon. In the present work, we propose a probabilistic model based on light-particle interaction and provide a modified Point Spread Function (PSF). The PSF so obtained may be used to better explain a physical phenomenon (beam-particle interaction) in the underwater point source image.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126393993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient CodeGuard mechanism against pollution attacks in interflow Network coding 针对互流网络编码中污染攻击的高效CodeGuard机制
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950076
J. Krithiga, R. Porselvi
The study of Network coding and the impact of data pollution attacks is done in wireless network . The main focus is on pollution attacks and defenses in interflow network coding systems. While most of the prior work is on detecting and filtering polluted packets in intraflow network coding systems. But we deal with an interflow coding systems. An additional goal is to identify and eliminate the attacker nodes quickly between 500-1sec of attack. The CodeGuard , a defense mechanism that combines proactive node attestation and reactive traceback identifies and eliminates the attacker nodes unequivocally. Analysis of CodeGuard proved that it is always able to identify and isolate at least one attacker node on every occurrence of a pollution attack. Experimental demonstration shows that Code Guard is able to identify attacker nodes quickly and restore system throughput to a high level, even in the presence of many attacker nodes, thus preserving the performance of the underlying interflow network coding system.
对无线网络中的网络编码和数据污染攻击的影响进行了研究。重点研究了流间网络编码系统中的污染攻击与防御。而之前的大部分工作都是在流内网络编码系统中检测和过滤污染数据包。但是我们处理的是一个互流编码系统。另一个目标是在攻击的500-1秒之间快速识别和消除攻击者节点。CodeGuard是一种结合了主动节点认证和被动追溯的防御机制,它明确地识别并消除了攻击者节点。对CodeGuard的分析证明,每次发生污染攻击时,它总是能够识别并隔离至少一个攻击者节点。实验证明,即使在存在许多攻击节点的情况下,Code Guard也能够快速识别攻击节点并将系统吞吐量恢复到较高水平,从而保持底层互流网络编码系统的性能。
{"title":"Efficient CodeGuard mechanism against pollution attacks in interflow Network coding","authors":"J. Krithiga, R. Porselvi","doi":"10.1109/ICCSP.2014.6950076","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950076","url":null,"abstract":"The study of Network coding and the impact of data pollution attacks is done in wireless network . The main focus is on pollution attacks and defenses in interflow network coding systems. While most of the prior work is on detecting and filtering polluted packets in intraflow network coding systems. But we deal with an interflow coding systems. An additional goal is to identify and eliminate the attacker nodes quickly between 500-1sec of attack. The CodeGuard , a defense mechanism that combines proactive node attestation and reactive traceback identifies and eliminates the attacker nodes unequivocally. Analysis of CodeGuard proved that it is always able to identify and isolate at least one attacker node on every occurrence of a pollution attack. Experimental demonstration shows that Code Guard is able to identify attacker nodes quickly and restore system throughput to a high level, even in the presence of many attacker nodes, thus preserving the performance of the underlying interflow network coding system.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel edge detection and pattern recognition algorithm based on beamlet theory for a vision-based wheeled mobile robot 基于波束理论的视觉轮式移动机器人边缘检测与模式识别新算法
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950041
S. Soumya, V. Geethapriya, S. Shankar Bharathi
Number of strategies have been deployed to make Wheeled Mobile Robots (WMRs) independent or with limited dependence on human assistance/intervention. In order to enhance their mobility, improvements have been made in their pattern recognition and path planning strategies. Vision-based approach is preferred over stereopsis-based, laser-range finders and GPS-based approaches on account of higher resolution and longer ranges. Vision-Based Wheeled Mobile Robot (VB-WMR) uses an active vision system where the observer is in motion. The goal of this project is to provide a novel algorithm aimed to detect and recognize direction indicators on sign boards placed on the course of the WMR. Here visual processing is devoted to noting the salient components like the edges of patterns on sign boards rather than processing the entire image. The proposed algorithm is based on the beamlet theory, which retains directional information besides the location and scale and performs well under noisy conditions. The developed algorithm in MATLAB is later to be incorporated with the VB-WMR.
为了使轮式移动机器人(WMRs)独立或有限地依赖于人类的协助/干预,已经部署了许多策略。为了提高它们的移动性,对它们的模式识别和路径规划策略进行了改进。基于视觉的方法比基于立体视觉、激光测距仪和基于gps的方法更受欢迎,因为它们具有更高的分辨率和更远的距离。基于视觉的轮式移动机器人(VB-WMR)采用主动视觉系统,使观察者处于运动状态。该项目的目标是提供一种新的算法,旨在检测和识别放置在WMR路线上的指示牌上的方向指示器。这里的视觉处理致力于注意显著的组成部分,如标识板上图案的边缘,而不是处理整个图像。该算法基于波束理论,除了保留位置和尺度信息外,还保留了方向信息,在噪声条件下具有良好的性能。在MATLAB中开发的算法随后将与VB-WMR相结合。
{"title":"A novel edge detection and pattern recognition algorithm based on beamlet theory for a vision-based wheeled mobile robot","authors":"S. Soumya, V. Geethapriya, S. Shankar Bharathi","doi":"10.1109/ICCSP.2014.6950041","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950041","url":null,"abstract":"Number of strategies have been deployed to make Wheeled Mobile Robots (WMRs) independent or with limited dependence on human assistance/intervention. In order to enhance their mobility, improvements have been made in their pattern recognition and path planning strategies. Vision-based approach is preferred over stereopsis-based, laser-range finders and GPS-based approaches on account of higher resolution and longer ranges. Vision-Based Wheeled Mobile Robot (VB-WMR) uses an active vision system where the observer is in motion. The goal of this project is to provide a novel algorithm aimed to detect and recognize direction indicators on sign boards placed on the course of the WMR. Here visual processing is devoted to noting the salient components like the edges of patterns on sign boards rather than processing the entire image. The proposed algorithm is based on the beamlet theory, which retains directional information besides the location and scale and performs well under noisy conditions. The developed algorithm in MATLAB is later to be incorporated with the VB-WMR.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131365291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A unidirectional data-flow model for cloud data security with user involvement during data transit 一个单向数据流模型,用于在数据传输过程中用户参与的云数据安全
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949883
Bhargav J. Bhatkalkar, Ramegowda
Traditional computational models are rapidly shifting from a centralized computing to a distributed computing paradigm. As a result of this shift, the buzz of cloud computing is heard everywhere these days. The main concern in cloud computing environment is providing security to the user data. Often user data is moved back and forth between Cloud Service Vendor (CSV) and Cloud Service User (CSU). The degree of trust of CSU in CSV varies when it comes to the sensitivity of data. A CSU may or may not trust the CSV. In the latter case, the CSU may be interested to use the security service provided by a Third-Party (TP) like a Certification Authority to whom both the CSU and CSV may trust. Once again here, the CSU may or may not even trust the TP based on the supremacy of the data. In order to provide a flexible and secure management of CSUs data, the proposed model explicitly considers the degree of trust possessed by the CSU in both CSV and TP. The movement of CSU data within the premises of CSV is also strictly controlled with the involvement of CSU so that the data is not moved arbitrarily without the consent of CSU. Majority of the flow of data among entities in the proposed model is kept unidirectional to block the reverse transmission of sensitive information and also to block the return path to shield the secure data source from hidden viruses, Trojans, malicious instructions or other intrusion attempts. The security mechanisms suggested for realization of the proposed model are widely accepted and practically proven. The proposed data security model ensures privacy and security of the data both at CSV side and CSU side.
传统的计算模型正迅速从集中式计算向分布式计算范式转变。这种转变的结果是,如今云计算的嗡嗡声无处不在。云计算环境的主要关注点是为用户数据提供安全性。用户数据经常在云服务供应商(CSV)和云服务用户(CSU)之间来回移动。CSV中CSU的信任程度随数据敏感性的不同而不同。CSU可能信任CSV,也可能不信任CSV。在后一种情况下,CSU可能有兴趣使用第三方(TP)提供的安全服务,比如CSU和CSV都可以信任的证书颁发机构。这里再次强调,CSU可能信任TP,也可能不信任TP,这是基于数据的至高无上性。为了提供灵活、安全的CSU数据管理,该模型明确考虑了CSU在CSV和TP中所拥有的信任程度。在CSU的参与下,对CSV场所内CSU数据的移动也有严格的控制,不允许未经CSU同意擅自移动数据。在该模型中,实体之间的大部分数据流都是单向的,以阻止敏感信息的反向传输,并阻止返回路径,以保护安全数据源免受隐藏的病毒、木马、恶意指令或其他入侵企图的影响。为实现所提出的模型而提出的安全机制已被广泛接受和实践证明。所提出的数据安全模型保证了CSV端和CSU端数据的私密性和安全性。
{"title":"A unidirectional data-flow model for cloud data security with user involvement during data transit","authors":"Bhargav J. Bhatkalkar, Ramegowda","doi":"10.1109/ICCSP.2014.6949883","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949883","url":null,"abstract":"Traditional computational models are rapidly shifting from a centralized computing to a distributed computing paradigm. As a result of this shift, the buzz of cloud computing is heard everywhere these days. The main concern in cloud computing environment is providing security to the user data. Often user data is moved back and forth between Cloud Service Vendor (CSV) and Cloud Service User (CSU). The degree of trust of CSU in CSV varies when it comes to the sensitivity of data. A CSU may or may not trust the CSV. In the latter case, the CSU may be interested to use the security service provided by a Third-Party (TP) like a Certification Authority to whom both the CSU and CSV may trust. Once again here, the CSU may or may not even trust the TP based on the supremacy of the data. In order to provide a flexible and secure management of CSUs data, the proposed model explicitly considers the degree of trust possessed by the CSU in both CSV and TP. The movement of CSU data within the premises of CSV is also strictly controlled with the involvement of CSU so that the data is not moved arbitrarily without the consent of CSU. Majority of the flow of data among entities in the proposed model is kept unidirectional to block the reverse transmission of sensitive information and also to block the return path to shield the secure data source from hidden viruses, Trojans, malicious instructions or other intrusion attempts. The security mechanisms suggested for realization of the proposed model are widely accepted and practically proven. The proposed data security model ensures privacy and security of the data both at CSV side and CSU side.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spur reduction technique for fractional-N frequency synthesizer with MASH 1-1-1-1 Sigma Delta modulator 带MASH -1-1-1 σ δ调制器的分数n频率合成器的杂散抑制技术
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949973
V. Tamilselvan, Maran Ponnambalam, P. Chandramani
A fourth order MASH Sigma Delta modulator based fractional-N frequency synthesizer was designed and validated as a Matlab/Simulink macro- model. Use of MASH achieves a better noise shaping for the frequencies generated by the synthesizer. With a reference frequency of 20MHz, the fractional-N frequency synthesizer achieves a synthesized frequency range of 200MHz to 220MHz with 2 MHz resolution. The macro-model has a gain margin of 6.02dB and a phase margin of 39.7°, ensuring the stability of the closed loop system with settling time of 3.32μ sec. Spurs that were introduced by the fractional feedback and reference input are removed through notch type Comb filter.
设计了一种基于四阶MASH σ δ调制器的分数n频率合成器,并通过Matlab/Simulink宏模型进行了验证。使用MASH可以为合成器产生的频率实现更好的噪声整形。分数n频率合成器的参考频率为20MHz,合成频率范围为200MHz至220MHz,分辨率为2mhz。宏观模型的增益裕度为6.02dB,相位裕度为39.7°,保证了闭环系统的稳定性,稳定时间为3.32μ sec,分数反馈和参考输入引入的杂散通过陷波型Comb滤波器去除。
{"title":"Spur reduction technique for fractional-N frequency synthesizer with MASH 1-1-1-1 Sigma Delta modulator","authors":"V. Tamilselvan, Maran Ponnambalam, P. Chandramani","doi":"10.1109/ICCSP.2014.6949973","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949973","url":null,"abstract":"A fourth order MASH Sigma Delta modulator based fractional-N frequency synthesizer was designed and validated as a Matlab/Simulink macro- model. Use of MASH achieves a better noise shaping for the frequencies generated by the synthesizer. With a reference frequency of 20MHz, the fractional-N frequency synthesizer achieves a synthesized frequency range of 200MHz to 220MHz with 2 MHz resolution. The macro-model has a gain margin of 6.02dB and a phase margin of 39.7°, ensuring the stability of the closed loop system with settling time of 3.32μ sec. Spurs that were introduced by the fractional feedback and reference input are removed through notch type Comb filter.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132459223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of MPC in synchronous OCDMA system 同步OCDMA系统中MPC的性能分析
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949860
A. Pragathi, S. Prince
Prime codes are a family of optical address codes that are suitable for optical fiber code division multiple access (OCDMA) systems using all-optical processing. Incoherent optical signal processing is used for generation of prime codes (PC) and modified prime codes (MPC). Prime codes are developed for an optical fiber network using (asynchronous) code division multiple access (CDMA). Prime codes are then modified to fit a synchronous transmission format which can accommodate a larger number of subscribers and more simultaneous users than CDMA. Bit error rate (BER) performance comparison of CDMA and synchronous code division multiple access (S/CDMA) have been made using Gaussian approximation technique.
素数码是一种适用于全光处理的光纤码分多址(OCDMA)系统的光地址码。非相干光信号处理用于生成素数码(PC)和修正素数码(MPC)。针对采用(异步)码分多址(CDMA)的光纤网络,开发了素数码。然后修改主码以适应同步传输格式,该格式可以容纳比CDMA更多的订户数量和更多的同时用户。利用高斯近似技术对CDMA和同步码分多址(S/CDMA)的误码率性能进行了比较。
{"title":"Performance analysis of MPC in synchronous OCDMA system","authors":"A. Pragathi, S. Prince","doi":"10.1109/ICCSP.2014.6949860","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949860","url":null,"abstract":"Prime codes are a family of optical address codes that are suitable for optical fiber code division multiple access (OCDMA) systems using all-optical processing. Incoherent optical signal processing is used for generation of prime codes (PC) and modified prime codes (MPC). Prime codes are developed for an optical fiber network using (asynchronous) code division multiple access (CDMA). Prime codes are then modified to fit a synchronous transmission format which can accommodate a larger number of subscribers and more simultaneous users than CDMA. Bit error rate (BER) performance comparison of CDMA and synchronous code division multiple access (S/CDMA) have been made using Gaussian approximation technique.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130451046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analysis for MC- DS CDMA using optimized coding technique 基于优化编码技术的MC- DS CDMA分析
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950155
U. Sivaraju, P. Vedasundravinayagam, V. Nagarajan
This paper addresses Concatenation coding scheme for Multicarrier Direct Sequence Code Division Multiple Access (MC DS CDMA). It is to support high capacity & utilizing less power among all sub channels. While using Multicarrier Code Division Multiple Access (MC CDMA), it only spreads codes in frequency domain, but main disadvantage is no code orthogonality. MC DS CDMA Signal is generated by serial-to-parallel converting the data symbols into N sub streams and applying Direct Sequence Code Division Multiple Access (DS-CDMA) on each individual sub-stream. It spreads both in Time and Frequency domain (TF Domain). MC-DS CDMA has the highest degrees of freedom in the family of CDMA schemes that can be beneficially exploited during the system design and reconfiguration procedures. A Concatenation Code concept is proposed to analyze and develop the MC-DS-CDMA. In coding theory, concatenated codes form a class of error-correcting codes that are derived by combining an inner code and an outer code. It gives solution to the problem of finding a code that has both exponentially decreasing error probabilities with increasing block length polynomial-time decoding.
本文研究了多载波直接序列码分多址(mcds CDMA)中的串联编码方案。在所有子信道中支持高容量和低功耗。采用多载波码分多址(mccdma)技术时,只在频域进行码的传播,其主要缺点是没有码的正交性。mcds CDMA信号是通过将数据符号串并转化为N个子流,并在每个子流上应用直接顺序码分多址(DS-CDMA)技术而产生的。它在时域和频域(TF域)都有传播。MC-DS CDMA在CDMA方案家族中具有最高的自由度,可在系统设计和重构过程中得到充分利用。提出了一种串联码的概念来分析和开发MC-DS-CDMA。在编码理论中,串接码是一类纠错码,由内码和外码组合而成。它解决了在多项式时间译码中,寻找一种错误概率随块长度增加而呈指数递减的码的问题。
{"title":"An analysis for MC- DS CDMA using optimized coding technique","authors":"U. Sivaraju, P. Vedasundravinayagam, V. Nagarajan","doi":"10.1109/ICCSP.2014.6950155","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950155","url":null,"abstract":"This paper addresses Concatenation coding scheme for Multicarrier Direct Sequence Code Division Multiple Access (MC DS CDMA). It is to support high capacity & utilizing less power among all sub channels. While using Multicarrier Code Division Multiple Access (MC CDMA), it only spreads codes in frequency domain, but main disadvantage is no code orthogonality. MC DS CDMA Signal is generated by serial-to-parallel converting the data symbols into N sub streams and applying Direct Sequence Code Division Multiple Access (DS-CDMA) on each individual sub-stream. It spreads both in Time and Frequency domain (TF Domain). MC-DS CDMA has the highest degrees of freedom in the family of CDMA schemes that can be beneficially exploited during the system design and reconfiguration procedures. A Concatenation Code concept is proposed to analyze and develop the MC-DS-CDMA. In coding theory, concatenated codes form a class of error-correcting codes that are derived by combining an inner code and an outer code. It gives solution to the problem of finding a code that has both exponentially decreasing error probabilities with increasing block length polynomial-time decoding.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Burstification threat in Optical Burst Switched Networks 光突发交换网络中的突发威胁
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949804
T. Fernandez, K. Brabagaran, N. Sreenath
Optical Burst Switching, an efficient core networking architecture, suffers from various security vulnerabilities. This paper proposes the Burstification threat and summarizes other potential threats for optical nodes.
光突发交换是一种高效的核心网络架构,但存在各种安全漏洞。本文提出了光节点的Burstification威胁,并总结了光节点的其他潜在威胁。
{"title":"Burstification threat in Optical Burst Switched Networks","authors":"T. Fernandez, K. Brabagaran, N. Sreenath","doi":"10.1109/ICCSP.2014.6949804","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949804","url":null,"abstract":"Optical Burst Switching, an efficient core networking architecture, suffers from various security vulnerabilities. This paper proposes the Burstification threat and summarizes other potential threats for optical nodes.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130865848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non stationary signal prediction using TVAR model 基于TVAR模型的非平稳信号预测
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950136
G. Ravi Shankar Reddy, R. Rao
In this paper Time-varying Auto Regressive (TVAR) model based approach for non stationary signal prediction in noisy environment is presented. Covariance method is applied for least square estimation of time-varying autoregressive parameters. In TVAR modeling approach, the time-varying parameters are expressed as a linear combination of constants multiplied by basis functions. In this paper, the TVAR parameters are expanded by a low-order discrete cosine basis. The order determination of TVAR model is addressed by means of the maximum likelihood estimation (MLE) algorithm. The experimental results are presented for prediction of Discrete AM, Discrete FM, Discrete AM-FM signals.
提出了一种基于时变自回归(TVAR)模型的噪声环境下非平稳信号预测方法。采用协方差法对时变自回归参数进行最小二乘估计。在TVAR建模方法中,时变参数表示为常数乘以基函数的线性组合。本文将TVAR参数用低阶离散余弦基展开。利用最大似然估计算法解决了TVAR模型的阶数确定问题。给出了离散调幅、离散调频、离散调幅调频信号预测的实验结果。
{"title":"Non stationary signal prediction using TVAR model","authors":"G. Ravi Shankar Reddy, R. Rao","doi":"10.1109/ICCSP.2014.6950136","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950136","url":null,"abstract":"In this paper Time-varying Auto Regressive (TVAR) model based approach for non stationary signal prediction in noisy environment is presented. Covariance method is applied for least square estimation of time-varying autoregressive parameters. In TVAR modeling approach, the time-varying parameters are expressed as a linear combination of constants multiplied by basis functions. In this paper, the TVAR parameters are expanded by a low-order discrete cosine basis. The order determination of TVAR model is addressed by means of the maximum likelihood estimation (MLE) algorithm. The experimental results are presented for prediction of Discrete AM, Discrete FM, Discrete AM-FM signals.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 International Conference on Communication and Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1